The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1007/978-3-319-97181-0_7
|View full text |Cite
|
Sign up to set email alerts
|

A New Scalable Botnet Detection Method in the Frequency Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The adaptability of NTFS+, fortified b y m achine learning, positions it as a resilient bulwark, capable of not only confronting current ransomware typologies but also showing promising potential to evolve in anticipation of future threats [10]. The findings d erived f rom t he N TFS+ s tudy illuminate the considerable merits of integrating advanced computational techniques with established cybersecurity methodologies [36], [21]. Such integration is shown to elevate the protective measures significantly, offering a fortified defense layer against the persistently evolving ransomware landscape [22].…”
Section: A Interpretation Of Findingsmentioning
confidence: 83%
See 1 more Smart Citation
“…The adaptability of NTFS+, fortified b y m achine learning, positions it as a resilient bulwark, capable of not only confronting current ransomware typologies but also showing promising potential to evolve in anticipation of future threats [10]. The findings d erived f rom t he N TFS+ s tudy illuminate the considerable merits of integrating advanced computational techniques with established cybersecurity methodologies [36], [21]. Such integration is shown to elevate the protective measures significantly, offering a fortified defense layer against the persistently evolving ransomware landscape [22].…”
Section: A Interpretation Of Findingsmentioning
confidence: 83%
“…Ransomware prevention encompasses an array of solutions, both technical and policy-oriented [11], [2], [8]. Technically, the development of endpoint security solutions, which integrate state-of-the-art threat prevention capabilities, play an instrumental role in thwarting the execution of ransomware attacks [9], [20], [36]. These solutions are adept at identifying and neutralizing potential threats before they can inflict damage [5], [10], [27].…”
Section: B Ransomware Preventionmentioning
confidence: 99%